Wednesday, July 17, 2019
Developments in Hacking, Cybercrime, and Malware Essay
The  routine one  tissue establish  firing of 2009 was Malicious PDF  act 49% of web based  outragesattempts to  behave  despiteful pdf content to victims through the web. The pdf attack is designed to exploit  unconditional vulnerabilities in applications that are able to process pdfs. A successful pdf attack could compromise the  equity and security of affected computers. (Symantec Corporation, 2009)The number  both web based attack of 2009 was the Microsoft  net profit Explorer ADODB.Stream Object file  trigger weakness. This exploit accounted for 18% of the total number of web based exploits for the year.This  photograph allows  taxis to  order  cattish files on a  undefendable computer when a  user visits a website hosting an exploit. In order for this attack to be successful, an attacker must exploit an arbitrary vulner skill that bypasses  profits Explorer  bail settings.Then the attacker can execute the malicious files that were installed by the initial security weakness. Thi   s vulnerability has been kn sustain since 2003, and patches have been released since 2004. This exploit exposes the  accompaniment that many computer systems were not  creation kept up to date. (Symantec Corporation, 2009)The number  third most common web based exploit of 2009 was the Microsoft Internet Explorer 7 uninitialized memory code  feat vulnerability. This attack works by enticing a victim to open a malicious web page. Once a user opens the web page it gives the attacker the ability to execute remote code on the victims computer. Since this is a browser based attack, it gives the hacker potentially more targets than relying on a plugin that may not get installed. (Symantec Corporation, 2009)The  solve 3 Malware attacks of 2013 were W32.Downadup, W32.Sality, and W32.Ramnit. Although their names all  beat with W32., each bug has its own way of exploiting a system. Lets take for instance the W32.Downadup. Thisworm has been well-nigh since 2008. This worm spreads by taking  wag   es of a remote code execution vulnerability found in Microsoft Windows  host service RFC. This worm strives to block  entryway to security related web sites  fleck attempting to spread to protected network shares via  living creature force of weak passwords. The certificate of the  full(a) network is at stake with this worm. This computer  virus demonstrates shows how important it is to keep servers and workstations updated with the latest virus definitions. (W32.Downadup.B, n.d.) The W32.Ramnit has been around since 2010. This worm is spread by  soiling executable drives and removable drives. This malware steals bank usernames and passwords.Having a security policy prohibiting personal drives from  existence used in the workplace is paramount. This  display case of attack could cause data  injustice if unmitigated. (Symantec Corporation, 2013) The W32.Sality is in my opinion the nastiest of all  trine bugs. What makes the W32.Sality particularly nasty is that it can infect executab   le files on local, removable, and shared drives. W32.Sality is  cognize as an (EPO) or entry  localize obscuring polymorphic file infector. Essentially, its a sophisticate worm-like virus that ensures its survival by downloading other malware and disabling security software.  whiz of the most damaging features of the W32.Sality virus is how it decentralizes  accomplice to peer networks with sophisticated code  focus that populates the network with infected computers. (W32.Sality., n.d.)ReferencesW32.Downadup.B. (n.d.). Retrieved June 26, 2014, from http//www.symantec.com/security_response/writeup.jsp?docid=2008-123015-3826-99 W32.Ramnit. (n.d.). Retrieved June 26, 2014, from http//www.symantec.com/security_response/writeup.jsp?docid=2010-011922-2056-99 W32.Sality. (n.d.). Retrieved June 26, 2014, from http//www.symantec.com/security_response/writeup.jsp?docid=2006-011714-3948-99 Symantec Corporation. (2009). Symantec Global Internet Security Threat Report Trends for 2009.  people  t   hinking Symantec Corporation. Symantec Corporation. (2013). Symantec Global Internet Security Threat Report Trends for 2009. Mountain View Symantec Corporation.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.